Software designed in a collaboration amongst Bluetree Concepts (a leading software developer), Bertus Laufs (a specialist in risk mitigation strategies) and Andre Fourie (specialist in process flow development) to track and manage events, providing management with key information in a standard format — consolidating information and saving time.
iSpy is a formal Loss Control Management System built on core IBM technology.
The application allows for two types of events:
· The Process Test
· An Occurrence
The Process Test
· A pre-set list of questions relating to the required business and security procedures is set up for each process within a business area.
· Each question has a simple answer — Yes, No or Not Applicable.
· The operator is expected to complete a number of these process tests for the business areas during each shift
· If the business area is found to be non-compliant (the answer to the question is No”) — then the operator must provide a description of the non-compliant situation.
· An e-mail message is automatically sent to the appropriate manager to inform him of the situation on completion of the test.
· The overall test is stored and a measure of compliance is calculated. These statistics will assist management to identify problem areas within the business.
The Occurrence Report
· If the operator sees a problem during the normal course of his observation of the business, he is able to log an occurrence report.
· The operator needs to detail what is seen as well as the action taken.
· The relevant managers will be notified automatically on the submission of the report.
· Statistics of the occurrences will be gathered per Business Area to assist in identifying problem areas.
User Access
The user access is managed through a web browser interface for the operator and a feature rich client for the manager. Training is simple and does not require a high degree of computer literacy.
Access Control and Security
Unique user identification is provided with a user sign-on feature, ensuring that only authorised users have access to the system. In addition, the databases are encrypted ensuring that all data is stored in a secure and managed process.
Integration
Over and above the advanced system features the system automatically sends the relevant key people an email with the relevant process or occurrence.
Configuration
The system is user configured, allowing the management team to define the criteria they seek to monitor.
Reporting
There are a number of reports provided. Key to these is a daily report emailed to the manager of the main events and occurrences. These exclude extraction into an Excel spreadsheet, which allows the user to define the key characteristics of the report. The system has online reports available for on demand immediate checking of activities — all accessed via a managers front-end.